NESCAU-UFLA / FuzzingToolView external linksLinks
Software for fuzzing, used on web application pentestings.
☆178Mar 8, 2024Updated last year
Alternatives and similar repositories for FuzzingTool
Users that are interested in FuzzingTool are comparing it to the libraries listed below
Sorting:
- Projeto voltado ao desenvolvimento de uma aplicação web intencionalmente vulnerável.☆11Feb 25, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- The most powerfull Web Content Scanner☆124Jun 18, 2025Updated 7 months ago
- ScanT3r - Module based Bug Bounty Automation Tool ( use Lotus instead github.com/bugBlocker/lotus )☆685Jan 4, 2026Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 7 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆800Jul 4, 2023Updated 2 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- WRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.☆19Nov 30, 2022Updated 3 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Nov 5, 2020Updated 5 years ago
- Burp Suite JSON/JS-Beautifier☆14Sep 17, 2019Updated 6 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Apr 3, 2021Updated 4 years ago
- A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus bu…☆570Feb 2, 2022Updated 4 years ago
- Whatsapp Bot model using whatsapp-web.js☆26Aug 23, 2023Updated 2 years ago
- ☆145Jul 25, 2022Updated 3 years ago
- Collection of notes and resources for the CompTIA PenTest+ exam.☆39Aug 24, 2019Updated 6 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- CVE-2022-22965 poc including reverse-shell support☆13Nov 29, 2023Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- xss vulnerability scanner and input fuzzing tool.☆60Apr 8, 2023Updated 2 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities, with CRLF chaining capabilities☆185Mar 2, 2021Updated 4 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago
- Heuristic Vulnerable Parameter Scanner☆602Jan 8, 2024Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Nov 15, 2020Updated 5 years ago
- Fast Modular Web Interfaces Bruteforcer☆225Nov 16, 2021Updated 4 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago